US4825050A - Security transaction system for financial data - Google Patents

Security transaction system for financial data Download PDF

Info

Publication number
US4825050A
US4825050A US06/531,673 US53167383A US4825050A US 4825050 A US4825050 A US 4825050A US 53167383 A US53167383 A US 53167383A US 4825050 A US4825050 A US 4825050A
Authority
US
United States
Prior art keywords
encoding
signal
media
decoding
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US06/531,673
Inventor
John B. Griffith
Donald F. Linton
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TRANSACTION SECURITY Corp PLANTATION FLA A CORP
Transaction Security Corp
Original Assignee
Transaction Security Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Transaction Security Corp filed Critical Transaction Security Corp
Priority to US06/531,673 priority Critical patent/US4825050A/en
Assigned to TRANSACTION SECURITY CORPORATION, PLANTATION, FLA., A CORP. reassignment TRANSACTION SECURITY CORPORATION, PLANTATION, FLA., A CORP. ASSIGNMENT OF ASSIGNORS INTEREST. Assignors: GRIFFITH, JOHN B., LINTON, DONALD F.
Application granted granted Critical
Publication of US4825050A publication Critical patent/US4825050A/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption

Definitions

  • Multilevel encoding methods utilizing encoding cards are presently being employed for transmission of financial data.
  • U.S. Pat. No. 4,328,414 shows a card which is unique to the individual based on an individual secret identifying code 11 in combination with additional numbers which are encrypted. After verifying the encoded card the user institution may encrypt the data for private security and control at the banking institution. The encoded card may be used in combination with the individuals personal identifier number 11, at the line of transaction, the account number 13, the bank I.D. 15, and the bank secret key 21.
  • the above described patent requires the implantation of a secret unique identifier as an integral part of the security system.
  • the present invention provides a transaction system employing a locking and unlocking system which employs a public key to generate a digital signature, a sender unit which decrypts a portion of the encoded card and user identifier number and a receiver unit that decrypts the private key of the public key.
  • the present invention provides a system wherein the decryption of the transmitted data statistically cannot be computated with knowledge of the encoded card and/or of the sender unit algorithm.
  • the present invention provides a means for preventing credit card fraud in at least two major categories, use of invalid cards which have been invalidated by the receiver unit and invalid transactions generated by using the sender unit.
  • the prior art in the area of financial data transmission requires an element of the transaction system be maintained in secrecy.
  • the security of the entire transaction system depends on maintaining the secrecy of that element of the transaction system.
  • the present invention is a system wherein the combination of events provides a statistically secure transaction system.
  • the present invention is an initially encrypted encoded card which, in combination with a sender unit utilizing a private key and individual identifier, provides a subsequently encrypted financial data which is transmitted to the receiver unit.
  • the receiver unit employs a public key to decrypt the transmitted financial data.
  • the encryption-decryption methods developed by Rivest, Sham and Adleman (RSA method) provide a basis for the public key cryptosystem.
  • the "locking and unlocking”, or encrypting and decrypting, respectively provide a method to distribute, transmit an individual information security key.
  • FIG. 1 is a flow chart of the locking method.
  • FIG. 2 is a flow chart of the unlocking method.
  • FIG. 3A is a flow chart of the transaction security method in stage one.
  • FIG. 3B is a flow chart of the transaction security method in stage two.
  • FIG. 3C is a flow chart of the transaction security method in stage three.
  • FIG. 4A is a flow chart of the authentication code generation and checking method in stage one.
  • FIG. 4B is a flow chart of the authentication code generation and checking method in stage two.
  • FIG. 5A is a block diagram of the main unit of the media generating apparatus.
  • FIG. 5B is a block diagram of the on sight media generating apparatus.
  • FIG. 6 is a block diagram of the transaction part apparatus.
  • FIG. 7 is a block design of the transaction part apparatus in accordance with FIG. 3 and/or FIG. 4.
  • lock and encrypt are interchangeable.
  • unlock and decrypt are interchangeable.
  • FIG. 1 there is shown an flow diagram of the media "locking” method employed in the present invention.
  • This method may be used to "lock” information 101 recorded or stored on some individualized media 115, e.g. the magnetic stripe of a credit card.
  • information is “locked” in this manner it may be “unlocked” only by the individual possessing the individual identifier 100. Further counterfeit or altered media can be detected.
  • Multiple inputs are accepted in the following manner: The individual information record 101 which is the data to be "locked”; the individual identifier 100 which may be some characteristic of the individual e.g. finger, voice, or retinal pattern, signature, or chemical structure or some information known only to the individual, e.g.
  • the individual identifier 100 presented may be mapped into a key space appropriate to the encoding method 104 using a reduction method 103 such as summation modulo the key space size yielding the individual identifier transform 106.
  • the individual information record 101 may be passed to a verification field generator 102 such as a check sum or parity mechanism to produce the plaintext verification field 105.
  • the individual information record 101 may be combined with the plaintext verification field 105, if present, and using the entity private key 110 is encoded by the first encoder 111, which employs any public key cryptosystem as above cited, to yield the intermediate ciphertext 107.
  • the intermediate cipher text 107 may be passed to a verification field generator 108 which may be a reuse or duplication of generator 102 or may employ a different technique, to generate the ciphertext verification field 112.
  • the intermediate ciphertext 107 is combined with said ciphertext verification field 112, if present, and using the individual identifier transform 106 as the key, is encoded by the second encoder 104 to yield the media cipher text 117.
  • Said encoder 104 may be a conventional NBS data encryption module or other private key technique accepting a key and encoding information thereby.
  • Said media ciphertext 117 and other data 113 such as account number or bank identification number, may be stored or recorded on the media 115, by media recorder, 114, using any technique of mechanical, electronic, magnetic, or optical recording or storage which is appropriate for the media 115.
  • Said media recorder, 114 may employ an error correcting and/or detecting recording method when appropriate.
  • FIG. 2 there is shown a flow diagram of the media "unlocking” method employed in the present invention.
  • This method is used to "unlock” the individual information record 216 stored on media 200 in accordance with the "locking" method of FIG. 1.
  • the method provides indications if the media was not “locked” by an entity possessing the private key corresponding to the entity public key 206 or if the individual identifier 210 is not the same as that used to "lock” the media 200, e.g. the media was counterfeited or was being used fraudulently.
  • Multiple inputs are required: Some media 200 stored or recorded in accordance with the method of FIG. 1; the entity public key 206 corresponding to the entity private key 110 of FIG.
  • the media 200 may be read by the media reader 202 which may employ an error detecting and/or correcting method, if such was employed when the media was recorded, to deliver the media ciphertext 203 and if such was included when the media was recorded, the other information 201.
  • the individual identifier 210 may be mapped into the key space appropriate to the first decoder 212 by the reduction method 211 yielding the individual identifier transform 216.
  • the media ciphertext 203 may be decoded using the individual identifier transform 216 as the key by first decoder 212 which employs a private key technique as at 104 of FIG. 1 to yield the intermediate ciphertext 207 and, if included during the "locking" process, the ciphertext verification field 208. If said field 208 is included it may be verified by sending the said field 208 and the intermediate ciphertext 207 to the verification check 209.
  • a new ciphertext verification field value is generated using the present intermediate ciphertext 207 in accordance with the checking method employed by the verification field generator 108 of FIG. 1.
  • the new value is compared with the ciphertext verification field 208. If there is relative equality, the "unlocking" process continues, otherwise a failure indication is raised and the process terminates.
  • the intermediate ciphertext 207 is decoded by the second decoder 205, which is compatible with the method employed in 104 of FIG. 1 to yield the individual information record 216 and, if included during the "locking" process, the plaintext verification field 215.
  • said field 215 may be verified by sending the said field 215 and the individual information record 216 to the verification checker 214.
  • a new plaintext verification field value is generated using the present individual information record 216 in accordance with the checking method employed by the verification field generator 102 of FIG. 1.
  • the new value is compared with the plaintext verification field 215. If there is relative equality, the "unlocking" process continues, otherwise a failure indication is raised and the process terminates.
  • FIG. 3 there is shown a flow diagram of the transaction security method of the present invention.
  • the method involves three stages: Stage 1 wherein the individual security key 301 is generated and “locked”, using the method of FIG. 1, onto the media 305; stage 2 wherein the individual security key 309 is "unlocked” using the method of FIG. 2, from the media 305 and combined with other data to produce the encoded transaction record 312; and stage 3 wherein the transaction record 314 is decoded.
  • stage 1 which is performed before the media 305 is issued by the entity to an individual, the random number generator 300 is used to produce a random individual security key 301 of appropriate size and nature for use by encoder 310 and decoder 316. Said key, 301, is paired with the individual identification 303.
  • the pair is recorded in suitable form in the files 302 of the issuing entity and, using the locking method of FIG. 1 and the required locking keys, records or stores said paired elements in locked representation upon media 305.
  • stage 2 which is performed when the media is presented to validate a transaction, the media 305 is unlocked by unlocking mechanism 307, which employs the method of FIG. 2, using the unlocking keys required to yield the individual security key 309 and individual identification 306 pair.
  • Any other data 308 relevant to the transaction may be encoded by encoder 310, which may be a conventional NBS data encryption module or other technique accepting a key and encoding information to yield a transaction ciphertext 311.
  • the ciphertext 311 may be combined with the individual identification 306 to yield the transaction record 312.
  • the record 312 may be transmitted, e.g. electronically, immediately or after some delay to the entity.
  • Stage 3 which is performed by the issuing entity after the transaction record 314 is received, the individual identification 313 from said record 314 is used to search the issuing entity's files 317. If said identification 313 cannot be found in files 317 then an error indication will be given. If said identification 313 is found in files 312, then the individual security key 318 paired with said identification 313 in files 317 is used by decoder 316.
  • the decoder 316 employs a method compatible with that of encoder 310, as the key to decode the transaction ciphertext 315 which was included in the transaction record 314 to yield the relevant transaction data 319.
  • FIG. 4 there is shown flow diagram of the authentication code generation and checking method of the present invention.
  • This method is employed to add to the transaction information set 404, 408, 409 and 410 a unique and verifiable authentication signature 411 and to verify such signatures when said information set 404, 408, 409 and 410 and signature reach the destination entity.
  • the method involves two stages: In the first stage, which may be employed at the transaction point, the media 402, which has been secured in accordance with the method of FIG. 3, is "unlocked” via the unlocking mechanism 406 which employs the method of FIG. 2, using the unlocking keys 401 required to yield the individual identification 412 and the individual security key 407.
  • Multiple inputs such as the location identification 409, the date and time representation or serial number 408, relevant transaction information 404, and/or other data 410 necessary or convenient to include may be accepted by the sigformation module 405 which also may accept the individual security key 407 to yield the authentication signature 411.
  • the sigformation module 405 may employ any appropriate method which will combine multiple inputs and the key 407 to produce a code of the desired size and nature, e.g. summation modulo the desired size.
  • the authentication signature 411, the inputs 404, 408, 409 and 410, and other auxiliary data 400 may be combined to yield the transaction information record 403.
  • stage two which is performed by the entity upon receipt of the transaction information record 413, the record 413 is separated into the elements from which it was assembled: The location identification 419; the date and time representation or serial number 417; the relevant transaction information 415; the auxiliary information 422, if included; other relevant data 420, if used; the generated authentication signature 423; and, the individual identification 414.
  • the identification 414 is used to search the entity files 418 which were generated in stage 1 of the security method of FIG. 3 for the individual security key 421 paired with identification 414 for storage in files 317.
  • FIG. 5 there is shown a block diagram of the media generation apparatus of the present invention for operation according to FIG. 1 which may also implement the transaction security method of FIG. 3 and/or authentication code generation method of FIG. 4.
  • an agent of the issuing entity enters, via the keyboard, 502, the individual identification 210 as shown in FIG. 1, and other optional data as desired.
  • the user then enters his personal identifier via said keyboard.
  • the mechanisms for processor 503 to accept such inputs and the means for interconnecting are well known.
  • Processor 503 using a reduction method as described above transforms the individual identifier 210 as shown in FIG. 1 into a value appropriate as a key for encryption module 509.
  • the processor 503 inputs a random individual security key from the random number generator 507 which may be a data bus connected free running source of random or pseudo-random numbers such as any circuit implementing the method described in Knuth ob cit.
  • the individual security key, the transformation, the individual identification, 210 as shown in FIG. 1, and other data are sent to encryption module 509 which may include an integrated circuit implentation of the NBS data-encryption standard available from Motorola, Inc. data bus connected to processor 503.
  • the encryption module 509 returns to the processor 503 the intermediate cipher text 107.
  • the processor 503 then reads the entity private key 506 from a source such as a read-only memory.
  • the key 506 and the cipher text 107 are combined using a public key method such as above described by processor 503 to produce the media cipher text 117 as shown in FIG. 1.
  • the entity agent is then prompted via display 501 to insert the media 505 into media recorder 504.
  • Processor 503 controls the recorder 504 to write the media cipher text 117 on the media 505.
  • the processor 503 then causes the individual identification 210 as shown in FIG. 1 and the individual security key to be stored in the issuing entity's files 508 by some means such as a bus connected disk controller or a communications link. In this way the media 505 has been generated to provide proof against counterfeiting and such that only the individual identifier 210 as shown in FIG. 1 will allow access to the above entered information.
  • FIG. 6 there is shown a block diagram of the transaction point apparatus for operation according to FIG. 2 which may also implement the transaction security method of FIG. 3 and/or the authentication code generation method of FIG. 4.
  • the media 605 is read by media reader 604 and the previously recorded media cipher text 117 is input by the processor 601 using or interconnection process known to the art.
  • the individual transactor is prompted via display 603 to enter this personal identifier via keyboard 602.
  • the identifier is input using any conventional means by processor 601 and using the above described method is transformed into a value appropriate as a key for encryption module 609.
  • the key and cipher text 117 are sent to the encryption module 609 such as described above which operates at this time in decryption mode.
  • the module 609 returns the intermediate cipher text 207.
  • the processor 601 then reads the entity public key 606 from some source such as read-only memory.
  • the key 606 and the cipher text 117 are combined by processor 601 using a public key method as above described to produce the individual identification, individual security key, and other data entered at media generation by the apparatus of FIG. 5.
  • the processor 601 then prompts via display 603 the entry of relevant information concerning the transaction via keyboard 602.
  • the transaction information is input by processor 601 as described above and inserted into the transaction information record.
  • the current date and time are input from the clock calendar module 607 which may include any of the commercially available time and date integrated circuits coupled by conventional means and inserted in the transaction information record.
  • the location identification 610 which may reside in read-only memory is added to the transaction information record.
  • the elements of the transaction information record are combined using any known digital signature method such as that published by D.W. Davies ob cit to produce the authentication code.
  • the code is combined with the transaction information record and in conjunction with the individual security key is sent to the encoding module 609.
  • FIG. 7 there is shown a block diagram of the transaction processing operation according to the transaction security method of FIG. 3 and/or the authentication code generation method of FIG. 4.
  • the transaction cipher text and associated data are received by the issuing entity via either digital data communications means 705 or any other means 704 for transporting such transaction records to said entity.
  • the individual identification is extracted from the transaction record.
  • the entity files 703 are referenced using any conventional means such as a disk controller or communications link and the individual security key associated with said individual identification is returned.
  • the key and the transaction cipher text are sent to the encoding module 702 such as above described which operates in a decryption mode at this time.
  • the encoding module 702 returns the transaction information record generated by the apparatus of FIG. 6.
  • Elements of the transaction information record are combined with the individual security key, using the above described means, to reproduce the authentication code. If the reproduced authentication code is equivalent to the received authentication code the transaction information record is sent by the above described means to the entity files 703 for further processing. In this way the transaction records are decoded and verified before acceptance.

Abstract

A system for a data protection executing financial transactions employing cryptographic techniques. The system comprises an encoded card, which has been initially encrypted using the National Bureau of Standards Data Encryption Standard Algorithm. A subsequent encryption utilizes a private key of a public key cryptosystem is completed resulting in an account number and an uncoded identifier which are placed on the card. The encoded card may be placed in a sender unit which decrypts the public key. The user that enters a personal identifier in the sender unit. The data is transferred to a receiving unit that decrypts the transmitted data utilizing the private key which is unknown to both the user and the sender unit.

Description

BACKGROUND OF THE INVENTION
Multilevel encoding methods utilizing encoding cards are presently being employed for transmission of financial data. U.S. Pat. No. 4,328,414 shows a card which is unique to the individual based on an individual secret identifying code 11 in combination with additional numbers which are encrypted. After verifying the encoded card the user institution may encrypt the data for private security and control at the banking institution. The encoded card may be used in combination with the individuals personal identifier number 11, at the line of transaction, the account number 13, the bank I.D. 15, and the bank secret key 21. The above described patent requires the implantation of a secret unique identifier as an integral part of the security system.
The present invention provides a transaction system employing a locking and unlocking system which employs a public key to generate a digital signature, a sender unit which decrypts a portion of the encoded card and user identifier number and a receiver unit that decrypts the private key of the public key. The present invention provides a system wherein the decryption of the transmitted data statistically cannot be computated with knowledge of the encoded card and/or of the sender unit algorithm. The present invention provides a means for preventing credit card fraud in at least two major categories, use of invalid cards which have been invalidated by the receiver unit and invalid transactions generated by using the sender unit.
SUMMARY OF THE INVENTION
The prior art in the area of financial data transmission requires an element of the transaction system be maintained in secrecy. The security of the entire transaction system depends on maintaining the secrecy of that element of the transaction system. The present invention is a system wherein the combination of events provides a statistically secure transaction system. The present invention is an initially encrypted encoded card which, in combination with a sender unit utilizing a private key and individual identifier, provides a subsequently encrypted financial data which is transmitted to the receiver unit. The receiver unit employs a public key to decrypt the transmitted financial data. The encryption-decryption methods developed by Rivest, Sham and Adleman (RSA method) provide a basis for the public key cryptosystem.
It is an object of this invention to provide a statistically secure system for the transmission of financial data.
It is a further object of this invention to provide a statistically secure system that "locks" or encrypts the financial data to be transmitted by multiple encryption of information.
It is still another object of this invention to "unlock" or decrypts the received financial data utilizing a public key and the personal identifier.
It is another object of this invention that the "locking and unlocking", or encrypting and decrypting, respectively, provide a method to distribute, transmit an individual information security key.
It is a further object of this invention to generate a digital signature for a transaction.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a flow chart of the locking method.
FIG. 2 is a flow chart of the unlocking method.
FIG. 3A is a flow chart of the transaction security method in stage one.
FIG. 3B is a flow chart of the transaction security method in stage two.
FIG. 3C is a flow chart of the transaction security method in stage three.
FIG. 4A is a flow chart of the authentication code generation and checking method in stage one.
FIG. 4B is a flow chart of the authentication code generation and checking method in stage two.
FIG. 5A is a block diagram of the main unit of the media generating apparatus.
FIG. 5B is a block diagram of the on sight media generating apparatus.
FIG. 6 is a block diagram of the transaction part apparatus.
FIG. 7 is a block design of the transaction part apparatus in accordance with FIG. 3 and/or FIG. 4.
DESCRIPTION OF THE PREFERRED EMBODIMENT
The term "lock" and encrypt are interchangeable. The term "unlock" and decrypt are interchangeable.
Referring now to FIG. 1, there is shown an flow diagram of the media "locking" method employed in the present invention. This method may be used to "lock" information 101 recorded or stored on some individualized media 115, e.g. the magnetic stripe of a credit card. When information is "locked" in this manner it may be "unlocked" only by the individual possessing the individual identifier 100. Further counterfeit or altered media can be detected. Multiple inputs are accepted in the following manner: The individual information record 101 which is the data to be "locked"; the individual identifier 100 which may be some characteristic of the individual e.g. finger, voice, or retinal pattern, signature, or chemical structure or some information known only to the individual, e.g. a combination, pass word or phrase; a private key 110 which is known only to the issuing entity and which is generated by any method 109 meeting the criteria for public key cryptosystems outlined by W. Diffie and M.E. Hellman in their article cited above such as the system publicly disclosed by Rivest, Shamir, and Adleman ob cit; and optionally other data 113 which is necessary or convenient to include regarding the application made of the present method. The individual identifier 100 presented may be mapped into a key space appropriate to the encoding method 104 using a reduction method 103 such as summation modulo the key space size yielding the individual identifier transform 106. The individual information record 101 may be passed to a verification field generator 102 such as a check sum or parity mechanism to produce the plaintext verification field 105. The individual information record 101 may be combined with the plaintext verification field 105, if present, and using the entity private key 110 is encoded by the first encoder 111, which employs any public key cryptosystem as above cited, to yield the intermediate ciphertext 107. The intermediate cipher text 107 may be passed to a verification field generator 108 which may be a reuse or duplication of generator 102 or may employ a different technique, to generate the ciphertext verification field 112. The intermediate ciphertext 107 is combined with said ciphertext verification field 112, if present, and using the individual identifier transform 106 as the key, is encoded by the second encoder 104 to yield the media cipher text 117. Said encoder 104 may be a conventional NBS data encryption module or other private key technique accepting a key and encoding information thereby. Said media ciphertext 117 and other data 113, such as account number or bank identification number, may be stored or recorded on the media 115, by media recorder, 114, using any technique of mechanical, electronic, magnetic, or optical recording or storage which is appropriate for the media 115. Said media recorder, 114, may employ an error correcting and/or detecting recording method when appropriate.
Referring now to FIG. 2 there is shown a flow diagram of the media "unlocking" method employed in the present invention. This method is used to "unlock" the individual information record 216 stored on media 200 in accordance with the "locking" method of FIG. 1. The method provides indications if the media was not "locked" by an entity possessing the private key corresponding to the entity public key 206 or if the individual identifier 210 is not the same as that used to "lock" the media 200, e.g. the media was counterfeited or was being used fraudulently. Multiple inputs are required: Some media 200 stored or recorded in accordance with the method of FIG. 1; the entity public key 206 corresponding to the entity private key 110 of FIG. 1 as outlined in the public key crytography references op cit; and the individual identifier 210 used in FIG. 1 at 100 and again entered or detected for use by this method. Multiple outputs are produced: If other ancillary information 201 has been stored or recorded at 113 of FIG. 1 it may be delivered; the individual information record 216, which is the data being "unlocked"; and an indication of the success or failure of the "unlocking" process. the media 200 may be read by the media reader 202 which may employ an error detecting and/or correcting method, if such was employed when the media was recorded, to deliver the media ciphertext 203 and if such was included when the media was recorded, the other information 201. The individual identifier 210 may be mapped into the key space appropriate to the first decoder 212 by the reduction method 211 yielding the individual identifier transform 216. The media ciphertext 203 may be decoded using the individual identifier transform 216 as the key by first decoder 212 which employs a private key technique as at 104 of FIG. 1 to yield the intermediate ciphertext 207 and, if included during the "locking" process, the ciphertext verification field 208. If said field 208 is included it may be verified by sending the said field 208 and the intermediate ciphertext 207 to the verification check 209. In said verification check 209, a new ciphertext verification field value is generated using the present intermediate ciphertext 207 in accordance with the checking method employed by the verification field generator 108 of FIG. 1. The new value is compared with the ciphertext verification field 208. If there is relative equality, the "unlocking" process continues, otherwise a failure indication is raised and the process terminates. Using the entity public key 206 produced by the entity key generator 204 according to the method ob cit, the intermediate ciphertext 207 is decoded by the second decoder 205, which is compatible with the method employed in 104 of FIG. 1 to yield the individual information record 216 and, if included during the "locking" process, the plaintext verification field 215. If said field 215 is included it may be verified by sending the said field 215 and the individual information record 216 to the verification checker 214. In said checker, 214, a new plaintext verification field value is generated using the present individual information record 216 in accordance with the checking method employed by the verification field generator 102 of FIG. 1. The new value, is compared with the plaintext verification field 215. If there is relative equality, the "unlocking" process continues, otherwise a failure indication is raised and the process terminates.
Referring now to FIG. 3 there is shown a flow diagram of the transaction security method of the present invention. The method involves three stages: Stage 1 wherein the individual security key 301 is generated and "locked", using the method of FIG. 1, onto the media 305; stage 2 wherein the individual security key 309 is "unlocked" using the method of FIG. 2, from the media 305 and combined with other data to produce the encoded transaction record 312; and stage 3 wherein the transaction record 314 is decoded. In stage 1, which is performed before the media 305 is issued by the entity to an individual, the random number generator 300 is used to produce a random individual security key 301 of appropriate size and nature for use by encoder 310 and decoder 316. Said key, 301, is paired with the individual identification 303. The pair is recorded in suitable form in the files 302 of the issuing entity and, using the locking method of FIG. 1 and the required locking keys, records or stores said paired elements in locked representation upon media 305. In stage 2, which is performed when the media is presented to validate a transaction, the media 305 is unlocked by unlocking mechanism 307, which employs the method of FIG. 2, using the unlocking keys required to yield the individual security key 309 and individual identification 306 pair. Any other data 308 relevant to the transaction may be encoded by encoder 310, which may be a conventional NBS data encryption module or other technique accepting a key and encoding information to yield a transaction ciphertext 311. The ciphertext 311 may be combined with the individual identification 306 to yield the transaction record 312. The record 312 may be transmitted, e.g. electronically, immediately or after some delay to the entity. Stage 3, which is performed by the issuing entity after the transaction record 314 is received, the individual identification 313 from said record 314 is used to search the issuing entity's files 317. If said identification 313 cannot be found in files 317 then an error indication will be given. If said identification 313 is found in files 312, then the individual security key 318 paired with said identification 313 in files 317 is used by decoder 316. The decoder 316 employs a method compatible with that of encoder 310, as the key to decode the transaction ciphertext 315 which was included in the transaction record 314 to yield the relevant transaction data 319.
Referring now to FIG. 4 there is shown flow diagram of the authentication code generation and checking method of the present invention. This method is employed to add to the transaction information set 404, 408, 409 and 410 a unique and verifiable authentication signature 411 and to verify such signatures when said information set 404, 408, 409 and 410 and signature reach the destination entity. The method involves two stages: In the first stage, which may be employed at the transaction point, the media 402, which has been secured in accordance with the method of FIG. 3, is "unlocked" via the unlocking mechanism 406 which employs the method of FIG. 2, using the unlocking keys 401 required to yield the individual identification 412 and the individual security key 407. Multiple inputs such as the location identification 409, the date and time representation or serial number 408, relevant transaction information 404, and/or other data 410 necessary or convenient to include may be accepted by the sigformation module 405 which also may accept the individual security key 407 to yield the authentication signature 411. The sigformation module 405 may employ any appropriate method which will combine multiple inputs and the key 407 to produce a code of the desired size and nature, e.g. summation modulo the desired size. The authentication signature 411, the inputs 404, 408, 409 and 410, and other auxiliary data 400 may be combined to yield the transaction information record 403. In stage two which is performed by the entity upon receipt of the transaction information record 413, the record 413 is separated into the elements from which it was assembled: The location identification 419; the date and time representation or serial number 417; the relevant transaction information 415; the auxiliary information 422, if included; other relevant data 420, if used; the generated authentication signature 423; and, the individual identification 414. The identification 414 is used to search the entity files 418 which were generated in stage 1 of the security method of FIG. 3 for the individual security key 421 paired with identification 414 for storage in files 317. If identification 414 is not found in files 317 a refusal indication is given and the process terminates, otherwise the key 407 and multiple inputs 415, 417, 419 and 420 are employed by the sigformation module 416 to duplicate the authentication signature generation step of stage 1 to yield the new authentication signature 424. This new authentication signature 424 and the purported authentication signature 423 are evaluated by comparator 425 for relative equality. If there is parity between signature 424 and signature 423 an acceptable indication------, is given, otherwise a refusal indication 426 is produced.
Referring now to FIG. 5 there is shown a block diagram of the media generation apparatus of the present invention for operation according to FIG. 1 which may also implement the transaction security method of FIG. 3 and/or authentication code generation method of FIG. 4. At the time the media 505 is to be issued, an agent of the issuing entity enters, via the keyboard, 502, the individual identification 210 as shown in FIG. 1, and other optional data as desired. The user then enters his personal identifier via said keyboard. The mechanisms for processor 503 to accept such inputs and the means for interconnecting are well known. Processor 503 using a reduction method as described above transforms the individual identifier 210 as shown in FIG. 1 into a value appropriate as a key for encryption module 509. The processor 503 inputs a random individual security key from the random number generator 507 which may be a data bus connected free running source of random or pseudo-random numbers such as any circuit implementing the method described in Knuth ob cit. The individual security key, the transformation, the individual identification, 210 as shown in FIG. 1, and other data are sent to encryption module 509 which may include an integrated circuit implentation of the NBS data-encryption standard available from Motorola, Inc. data bus connected to processor 503. The encryption module 509 returns to the processor 503 the intermediate cipher text 107. The processor 503 then reads the entity private key 506 from a source such as a read-only memory. The key 506 and the cipher text 107 are combined using a public key method such as above described by processor 503 to produce the media cipher text 117 as shown in FIG. 1. The entity agent is then prompted via display 501 to insert the media 505 into media recorder 504. Processor 503 then controls the recorder 504 to write the media cipher text 117 on the media 505. The processor 503 then causes the individual identification 210 as shown in FIG. 1 and the individual security key to be stored in the issuing entity's files 508 by some means such as a bus connected disk controller or a communications link. In this way the media 505 has been generated to provide proof against counterfeiting and such that only the individual identifier 210 as shown in FIG. 1 will allow access to the above entered information.
Referring now to FIG. 6 there is shown a block diagram of the transaction point apparatus for operation according to FIG. 2 which may also implement the transaction security method of FIG. 3 and/or the authentication code generation method of FIG. 4. At the time the media 605 is presented to execute a transaction, the media 605 is read by media reader 604 and the previously recorded media cipher text 117 is input by the processor 601 using or interconnection process known to the art. The individual transactor is prompted via display 603 to enter this personal identifier via keyboard 602. The identifier is input using any conventional means by processor 601 and using the above described method is transformed into a value appropriate as a key for encryption module 609. The key and cipher text 117 are sent to the encryption module 609 such as described above which operates at this time in decryption mode. The module 609 returns the intermediate cipher text 207. The processor 601 then reads the entity public key 606 from some source such as read-only memory. The key 606 and the cipher text 117 are combined by processor 601 using a public key method as above described to produce the individual identification, individual security key, and other data entered at media generation by the apparatus of FIG. 5. The processor 601 then prompts via display 603 the entry of relevant information concerning the transaction via keyboard 602. The transaction information is input by processor 601 as described above and inserted into the transaction information record. The current date and time are input from the clock calendar module 607 which may include any of the commercially available time and date integrated circuits coupled by conventional means and inserted in the transaction information record. The location identification 610 which may reside in read-only memory is added to the transaction information record. The elements of the transaction information record are combined using any known digital signature method such as that published by D.W. Davies ob cit to produce the authentication code. The code is combined with the transaction information record and in conjunction with the individual security key is sent to the encoding module 609. The module 609 now operating to encode, returns the transaction cipher text which is sent by conventional means to the issuing entity's files 608. In this manner a transaction may be executed and a digitally signed and encoded record of the transaction produced.
Referring now to FIG. 7 there is shown a block diagram of the transaction processing operation according to the transaction security method of FIG. 3 and/or the authentication code generation method of FIG. 4. At the time the transaction cipher text and associated data are received by the issuing entity via either digital data communications means 705 or any other means 704 for transporting such transaction records to said entity. The individual identification is extracted from the transaction record. The entity files 703 are referenced using any conventional means such as a disk controller or communications link and the individual security key associated with said individual identification is returned. The key and the transaction cipher text are sent to the encoding module 702 such as above described which operates in a decryption mode at this time. The encoding module 702 returns the transaction information record generated by the apparatus of FIG. 6. Elements of the transaction information record are combined with the individual security key, using the above described means, to reproduce the authentication code. If the reproduced authentication code is equivalent to the received authentication code the transaction information record is sent by the above described means to the entity files 703 for further processing. In this way the transaction records are decoded and verified before acceptance.
Many variations in implementation of the above apparatus, such as the distribution of various functions in space or time, the multiplication or reduction in the number of functional elements, or the substitution of differing means for the particular means described above, are clearly possible for anyone skilled in the art, however the above described apparatus is simply the best, most compact, and most general implementation known and is meant to encompass any such variation in implementation detail.

Claims (4)

What is claimed is:
1. Apparatus for encoding a signal on an individual machine readable media when issued by an entity to a user for uniquely securing said media for use in performing transactions with said entity comprising:
entity public key cryptosystem key generating means (109) to produce a private key signal (110) and public key signal (206) pair;
user individual information input means (101) and checksum generating means (102) for providing specific user identity data and checksum verification data (105);
encoder means for encoding including a first encoding means (111) and a second encoding means (104), said first encoding means (111) is a public key cryptosystem and said second encoding means (104) is a private key cryptosystem;
said first encoding means (111) connected to said user individual input means (101) and checksum verification generating means (102) and said entity private key signal (110) for producing a first encoding signal (107);
said second encoding means (104) connected to said first encoding means (111) and checksum verification generating means (108) and user identification input means (100 and reduction means 103), for producing a media encoding signal (117);
said first encoding means (111) and said second encoding means (104) connected together to produce a signal at least twice encoded for use as said media encoding signal (117);
transducer means (114) connected to said second encoding means 104, said transducer means operable with the machine readable media (115) for recording a detectable signal thereon representative of at least said media encoding signal (117).
2. The apparatus according to claim 1, wherein said first encoding means and its corresponding input signals is a private key cryptosystem and said second encoding means and its corresponding input signals is a public key cryptosystem.
3. Apparatus for decoding a signal on an individual machine readable media when issued by a entity and used by a user for uniquely verifying said media for use in performing transactions with said entity comprising:
a media reader means (202) for reading said media encoding signal (200),
decoder means for decoding including a first decoding means (212) and a second decoding means (205), said first decoding means (212) is a private key cryptosystem and said second decoding means (205) is a public key cryptosystem,
said first decoding means (212) connected to said media reader input means (202) and checksum verification generating means (209) and user identification input means (210 and reduction generating means 211) for producing a first decoding signal (203),
said second decoding means (205) connected to said first decoding means (212) and checksum verification generating means (214) and said entity public key signal (206) for producing individual information input (216),
said first decoding means (212) and said second decoding means (205) connected together to produce a signal at least twice decoded for producing individual information input (216).
4. The apparatus according to claim 3 wherein the first decoding means and its corresponding input signals is a public key cryptosystem and said second decoding means and its corresponding input signals is a private key cryptosystem.
US06/531,673 1983-09-13 1983-09-13 Security transaction system for financial data Expired - Fee Related US4825050A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US06/531,673 US4825050A (en) 1983-09-13 1983-09-13 Security transaction system for financial data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US06/531,673 US4825050A (en) 1983-09-13 1983-09-13 Security transaction system for financial data

Publications (1)

Publication Number Publication Date
US4825050A true US4825050A (en) 1989-04-25

Family

ID=24118579

Family Applications (1)

Application Number Title Priority Date Filing Date
US06/531,673 Expired - Fee Related US4825050A (en) 1983-09-13 1983-09-13 Security transaction system for financial data

Country Status (1)

Country Link
US (1) US4825050A (en)

Cited By (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4993068A (en) * 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
US4998279A (en) * 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US5016274A (en) * 1988-11-08 1991-05-14 Silvio Micali On-line/off-line digital signing
US5131038A (en) * 1990-11-07 1992-07-14 Motorola, Inc. Portable authentification system
US5276735A (en) * 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5371794A (en) * 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
US5386103A (en) * 1993-07-06 1995-01-31 Neurnetics Ltd. Identification and verification system
US5422468A (en) * 1992-10-30 1995-06-06 Abecassis; Max Deposit authorization system
US5444780A (en) * 1993-07-22 1995-08-22 International Business Machines Corporation Client/server based secure timekeeping system
GB2287565A (en) * 1994-03-18 1995-09-20 Transmo Limited Card charging system
US5596718A (en) * 1992-07-10 1997-01-21 Secure Computing Corporation Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor
US5835595A (en) * 1996-09-04 1998-11-10 At&T Corp Method and apparatus for crytographically protecting data
US5956194A (en) * 1994-09-16 1999-09-21 Kabushiki Kaisha Toshiba Data storage apparatus
WO2000039758A1 (en) * 1998-12-24 2000-07-06 Deutsche Telekom Ag Method for the secure handling of money or units of value with pre-paid data carriers
US6213391B1 (en) * 1997-09-10 2001-04-10 William H. Lewis Portable system for personal identification based upon distinctive characteristics of the user
US20010047330A1 (en) * 1998-12-02 2001-11-29 Gephart Brian R. Electronic payment system employing selectively activatable limited-use account number
US20020016913A1 (en) * 2000-08-04 2002-02-07 Wheeler Lynn Henry Modifying message data and generating random number digital signature within computer chip
US20020023215A1 (en) * 1996-12-04 2002-02-21 Wang Ynjiun P. Electronic transaction systems and methods therefor
US20020026575A1 (en) * 1998-11-09 2002-02-28 Wheeler Lynn Henry Account-based digital signature (ABDS) system
US20020032860A1 (en) * 1998-11-09 2002-03-14 Wheeler Anne Mcafee Account authority digital signature
US6364208B1 (en) 1999-03-29 2002-04-02 Transmo Limited Card changing system
US6402038B1 (en) 1999-03-29 2002-06-11 Transmo Limited Card charging system
US20020123967A1 (en) * 1998-04-27 2002-09-05 Wang Ynjiun P. Methods of exchanging secure messages
US20030014372A1 (en) * 2000-08-04 2003-01-16 Wheeler Lynn Henry Trusted authentication digital signature (tads) system
US6510998B1 (en) 1999-03-29 2003-01-28 Transmo Limited Card charging system
US20030097573A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Central Key Authority Database in an ABDS System
US20030097561A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System
US20030101136A1 (en) * 2000-08-04 2003-05-29 First Data Corporation Managing Account Database in ABDS System
US20030115151A1 (en) * 2000-08-04 2003-06-19 Wheeler Lynn Henry Person-centric account-based digital signature system
US20030126439A1 (en) * 2000-08-04 2003-07-03 First Data Corporation ABDS System Utilizing Security Information in Authenticating Entity Access
US20040005051A1 (en) * 2000-08-04 2004-01-08 Wheeler Lynn Henry Entity authentication in eletronic communications by providing verification status of device
US20040030901A1 (en) * 2000-08-04 2004-02-12 Lynn Henry Wheeler Linking public key of device to information during manufacture
US6745936B1 (en) * 1996-08-23 2004-06-08 Orion Systems, Inc. Method and apparatus for generating secure endorsed transactions
US20040128508A1 (en) * 2001-08-06 2004-07-01 Wheeler Lynn Henry Method and apparatus for access authentication entity
US6816872B1 (en) 1990-04-26 2004-11-09 Timespring Software Corporation Apparatus and method for reconstructing a file from a difference signature and an original file
US7062073B1 (en) 1999-01-19 2006-06-13 Tumey David M Animated toy utilizing artificial intelligence and facial image recognition
US20060153368A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Software for providing based on shared knowledge public keys having same private key
US20060156013A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Digital signature software using ephemeral private key and system
US20060153369A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Providing cryptographic key based on user input data
US20060153370A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Generating public-private key pair based on user input data
US20060156012A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Facilitating digital signature based on ephemeral private key
US20060153371A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Generating digital signatures using ephemeral cryptographic key
US20060153364A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Asymmetric key cryptosystem based on shared knowledge
US20060153367A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Digital signature system based on shared knowledge
US20060153366A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Verifying digital signature based on shared knowledge
US20060153365A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Providing digital signature and public key based on shared knowledge
US7130823B1 (en) 1995-09-14 2006-10-31 Citibank Aktiengesellschaft Computer system for data management and method for operation of the system
US7254561B1 (en) 1997-05-15 2007-08-07 Comex Electronics Ab Method and device for performing electronic transactions
US20070226497A1 (en) * 2006-03-27 2007-09-27 Taylor John P Communication protocol for device authentication
US20080022091A1 (en) * 2006-07-19 2008-01-24 Sanjay Deshpande Secure Communications
US7734251B1 (en) 1981-11-03 2010-06-08 Personalized Media Communications, Llc Signal processing apparatus and methods
US7769344B1 (en) 1981-11-03 2010-08-03 Personalized Media Communications, Llc Signal processing apparatus and methods
US20100241853A1 (en) * 2006-03-27 2010-09-23 Taylor John P System and method for generating a plaintext / cyphertext database for use in device authentication
US20140016777A1 (en) * 2012-07-12 2014-01-16 Elwha Llc Pre-Event Repository Associated with Individual Privacy and Public Safety Protection Via Double Encrypted Lock Box
US9515989B1 (en) * 2012-02-24 2016-12-06 EMC IP Holding Company LLC Methods and apparatus for silent alarm channels using one-time passcode authentication tokens
US9825760B2 (en) 2012-07-12 2017-11-21 Elwha, Llc Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box
US10069958B1 (en) 2017-07-20 2018-09-04 Bank Of America Corporation Dynamic mobile authorization advancement system
US10079811B2 (en) 2011-09-07 2018-09-18 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
USRE47642E1 (en) 1981-11-03 2019-10-08 Personalized Media Communications LLC Signal processing apparatus and methods

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4023012A (en) * 1974-07-08 1977-05-10 Omron Tateisi Electronics Co. System for verifying the user of a card
US4198619A (en) * 1976-10-28 1980-04-15 Atalla Technovations Corporation Programmable security system and method
US4304990A (en) * 1979-12-11 1981-12-08 Atalla Technovations Multilevel security apparatus and method
US4306111A (en) * 1979-05-31 1981-12-15 Communications Satellite Corporation Simple and effective public-key cryptosystem
US4315101A (en) * 1979-02-05 1982-02-09 Atalla Technovations Method and apparatus for securing data transmissions
US4328414A (en) * 1979-12-11 1982-05-04 Atalla Technovations Multilevel security apparatus and method
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4438824A (en) * 1981-04-22 1984-03-27 Siemens Corporation Apparatus and method for cryptographic identity verification
US4503287A (en) * 1981-11-23 1985-03-05 Analytics, Inc. Two-tiered communication security employing asymmetric session keys
US4578530A (en) * 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4023012A (en) * 1974-07-08 1977-05-10 Omron Tateisi Electronics Co. System for verifying the user of a card
US4198619A (en) * 1976-10-28 1980-04-15 Atalla Technovations Corporation Programmable security system and method
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4315101A (en) * 1979-02-05 1982-02-09 Atalla Technovations Method and apparatus for securing data transmissions
US4306111A (en) * 1979-05-31 1981-12-15 Communications Satellite Corporation Simple and effective public-key cryptosystem
US4304990A (en) * 1979-12-11 1981-12-08 Atalla Technovations Multilevel security apparatus and method
US4328414A (en) * 1979-12-11 1982-05-04 Atalla Technovations Multilevel security apparatus and method
US4438824A (en) * 1981-04-22 1984-03-27 Siemens Corporation Apparatus and method for cryptographic identity verification
US4578530A (en) * 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4503287A (en) * 1981-11-23 1985-03-05 Analytics, Inc. Two-tiered communication security employing asymmetric session keys

Cited By (222)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8060903B1 (en) 1981-11-03 2011-11-15 Personalized Media PMC Communications, L.L.C. Signal processing apparatus and methods
US8191091B1 (en) 1981-11-03 2012-05-29 Personalized Media Communications, Llc Signal processing apparatus and methods
USRE48682E1 (en) 1981-11-03 2021-08-10 Personalized Media Communications LLC Providing subscriber specific content in a network
USRE48633E1 (en) 1981-11-03 2021-07-06 Personalized Media Communications LLC Reprogramming of a programmable device of a specific version
USRE48565E1 (en) 1981-11-03 2021-05-18 Personalized Media Communications LLC Providing a subscriber specific solution in a computer network
USRE48484E1 (en) 1981-11-03 2021-03-23 Personalized Media Communications, Llc Signal processing apparatus and methods
US10715835B1 (en) 1981-11-03 2020-07-14 John Christopher Harvey Signal processing apparatus and methods
USRE47968E1 (en) 1981-11-03 2020-04-28 Personalized Media Communications LLC Signal processing apparatus and methods
US10616638B1 (en) 1981-11-03 2020-04-07 Personalized Media Communications LLC Signal processing apparatus and methods
US10609425B1 (en) 1981-11-03 2020-03-31 Personalized Media Communications, L.L.C. Signal processing apparatus and methods
USRE47867E1 (en) 1981-11-03 2020-02-18 Personalized Media Communications LLC Signal processing apparatus and methods
US10523350B1 (en) 1981-11-03 2019-12-31 Personalized Media Communications LLC Signal processing apparatus and methods
USRE47642E1 (en) 1981-11-03 2019-10-08 Personalized Media Communications LLC Signal processing apparatus and methods
US7734251B1 (en) 1981-11-03 2010-06-08 Personalized Media Communications, Llc Signal processing apparatus and methods
US9674560B1 (en) 1981-11-03 2017-06-06 Personalized Media Communications LLC Signal processing apparatus and methods
US9294205B1 (en) 1981-11-03 2016-03-22 Personalized Media Communications LLC Signal processing apparatus and methods
US7761890B1 (en) 1981-11-03 2010-07-20 Personalized Media Communications, Llc Signal processing apparatus and methods
US9038124B1 (en) 1981-11-03 2015-05-19 Personalized Media Communications, Llc Signal processing apparatus and methods
US8973034B1 (en) 1981-11-03 2015-03-03 Personalized Media Communications LLC Signal processing apparatus and methods
US8914825B1 (en) 1981-11-03 2014-12-16 Personalized Media Communications LLC Signal processing apparatus and methods
US8893177B1 (en) 1981-11-03 2014-11-18 {Personalized Media Communications, LLC Signal processing apparatus and methods
US8869228B1 (en) 1981-11-03 2014-10-21 Personalized Media Communications, Llc Signal processing apparatus and methods
US8869229B1 (en) 1981-11-03 2014-10-21 Personalized Media Communications, Llc Signal processing apparatus and methods
US8839293B1 (en) 1981-11-03 2014-09-16 Personalized Media Communications, Llc Signal processing apparatus and methods
US8804727B1 (en) 1981-11-03 2014-08-12 Personalized Media Communications, Llc Signal processing apparatus and methods
US8752088B1 (en) 1981-11-03 2014-06-10 Personalized Media Communications LLC Signal processing apparatus and methods
US8739241B1 (en) 1981-11-03 2014-05-27 Personalized Media Communications LLC Signal processing apparatus and methods
US8713624B1 (en) 1981-11-03 2014-04-29 Personalized Media Communications LLC Signal processing apparatus and methods
US8683539B1 (en) 1981-11-03 2014-03-25 Personalized Media Communications, Llc Signal processing apparatus and methods
US8675775B1 (en) 1981-11-03 2014-03-18 Personalized Media Communications, Llc Signal processing apparatus and methods
US8646001B1 (en) 1981-11-03 2014-02-04 Personalized Media Communications, Llc Signal processing apparatus and methods
US8640184B1 (en) 1981-11-03 2014-01-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US8635644B1 (en) 1981-11-03 2014-01-21 Personalized Media Communications LLC Signal processing apparatus and methods
US8621547B1 (en) 1981-11-03 2013-12-31 Personalized Media Communications, Llc Signal processing apparatus and methods
US8613034B1 (en) 1981-11-03 2013-12-17 Personalized Media Communications, Llc Signal processing apparatus and methods
US8607296B1 (en) 1981-11-03 2013-12-10 Personalized Media Communications LLC Signal processing apparatus and methods
US8601528B1 (en) 1981-11-03 2013-12-03 Personalized Media Communications, L.L.C. Signal processing apparatus and methods
US8587720B1 (en) 1981-11-03 2013-11-19 Personalized Media Communications LLC Signal processing apparatus and methods
US8584162B1 (en) 1981-11-03 2013-11-12 Personalized Media Communications LLC Signal processing apparatus and methods
US8572671B1 (en) 1981-11-03 2013-10-29 Personalized Media Communications LLC Signal processing apparatus and methods
US8566868B1 (en) 1981-11-03 2013-10-22 Personalized Media Communications, L.L.C. Signal processing apparatus and methods
US8558950B1 (en) 1981-11-03 2013-10-15 Personalized Media Communications LLC Signal processing apparatus and methods
US8559635B1 (en) 1981-11-03 2013-10-15 Personalized Media Communications, L.L.C. Signal processing apparatus and methods
US8395707B1 (en) 1981-11-03 2013-03-12 Personalized Media Communications LLC Signal processing apparatus and methods
US8112782B1 (en) 1981-11-03 2012-02-07 Personalized Media Communications, Llc Signal processing apparatus and methods
US8046791B1 (en) 1981-11-03 2011-10-25 Personalized Media Communications, Llc Signal processing apparatus and methods
US7992169B1 (en) 1981-11-03 2011-08-02 Personalized Media Communications LLC Signal processing apparatus and methods
US7940931B1 (en) 1981-11-03 2011-05-10 Personalized Media Communications LLC Signal processing apparatus and methods
US7926084B1 (en) 1981-11-03 2011-04-12 Personalized Media Communications LLC Signal processing apparatus and methods
US7908638B1 (en) 1981-11-03 2011-03-15 Personalized Media Communications LLC Signal processing apparatus and methods
US7889865B1 (en) 1981-11-03 2011-02-15 Personalized Media Communications, L.L.C. Signal processing apparatus and methods
US7870581B1 (en) 1981-11-03 2011-01-11 Personalized Media Communications, Llc Signal processing apparatus and methods
US7864248B1 (en) 1981-11-03 2011-01-04 Personalized Media Communications, Llc Signal processing apparatus and methods
US7865920B1 (en) 1981-11-03 2011-01-04 Personalized Media Communications LLC Signal processing apparatus and methods
US7864956B1 (en) 1981-11-03 2011-01-04 Personalized Media Communications, Llc Signal processing apparatus and methods
US7861263B1 (en) 1981-11-03 2010-12-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US7860131B1 (en) 1981-11-03 2010-12-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US7856650B1 (en) 1981-11-03 2010-12-21 Personalized Media Communications, Llc Signal processing apparatus and methods
US7856649B1 (en) 1981-11-03 2010-12-21 Personalized Media Communications, Llc Signal processing apparatus and methods
US7849479B1 (en) 1981-11-03 2010-12-07 Personalized Media Communications, Llc Signal processing apparatus and methods
US7849493B1 (en) 1981-11-03 2010-12-07 Personalized Media Communications, Llc Signal processing apparatus and methods
US7844995B1 (en) 1981-11-03 2010-11-30 Personalized Media Communications, Llc Signal processing apparatus and methods
US7752649B1 (en) 1981-11-03 2010-07-06 Personalized Media Communications, Llc Signal processing apparatus and methods
US7831204B1 (en) 1981-11-03 2010-11-09 Personalized Media Communications, Llc Signal processing apparatus and methods
US7830925B1 (en) 1981-11-03 2010-11-09 Personalized Media Communications, Llc Signal processing apparatus and methods
US7827586B1 (en) 1981-11-03 2010-11-02 Personalized Media Communications, Llc Signal processing apparatus and methods
US7827587B1 (en) 1981-11-03 2010-11-02 Personalized Media Communications, Llc Signal processing apparatus and methods
US7823175B1 (en) 1981-11-03 2010-10-26 Personalized Media Communications LLC Signal processing apparatus and methods
US7818776B1 (en) 1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods
US7818777B1 (en) 1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods
US7817208B1 (en) 1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods
US7818761B1 (en) 1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods
US7814526B1 (en) 1981-11-03 2010-10-12 Personalized Media Communications, Llc Signal processing apparatus and methods
US7810115B1 (en) 1981-11-03 2010-10-05 Personalized Media Communications, Llc Signal processing apparatus and methods
US7805748B1 (en) 1981-11-03 2010-09-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US7805738B1 (en) 1981-11-03 2010-09-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US7805749B1 (en) 1981-11-03 2010-09-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US7801304B1 (en) 1981-11-03 2010-09-21 Personalized Media Communications, Llc Signal processing apparatus and methods
US7797717B1 (en) 1981-11-03 2010-09-14 Personalized Media Communications, Llc Signal processing apparatus and methods
US7793332B1 (en) 1981-11-03 2010-09-07 Personalized Media Communications, Llc Signal processing apparatus and methods
US7784082B1 (en) 1981-11-03 2010-08-24 Personalized Media Communications, Llc Signal processing apparatus and methods
US7783252B1 (en) 1981-11-03 2010-08-24 Personalized Media Communications, Llc Signal processing apparatus and methods
US7774809B1 (en) 1981-11-03 2010-08-10 Personalized Media Communications, Llc Signal processing apparatus and method
US7769344B1 (en) 1981-11-03 2010-08-03 Personalized Media Communications, Llc Signal processing apparatus and methods
US7769170B1 (en) 1981-11-03 2010-08-03 Personalized Media Communications, Llc Signal processing apparatus and methods
US7764685B1 (en) 1981-11-03 2010-07-27 Personalized Media Communications, L.L.C. Signal processing apparatus and methods
US9210370B1 (en) 1981-11-03 2015-12-08 Personalized Media Communications LLC Signal processing apparatus and methods
US7836480B1 (en) 1981-11-03 2010-11-16 Personalized Media Communications, Llc Signal processing apparatus and methods
US10334292B1 (en) 1981-11-03 2019-06-25 Personalized Media Communications LLC Signal processing apparatus and methods
US4998279A (en) * 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US7966640B1 (en) 1987-09-11 2011-06-21 Personalized Media Communications, Llc Signal processing apparatus and methods
US7958527B1 (en) 1987-09-11 2011-06-07 Personalized Media Communications, Llc Signal processing apparatus and methods
US5016274A (en) * 1988-11-08 1991-05-14 Silvio Micali On-line/off-line digital signing
US4993068A (en) * 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
US6816872B1 (en) 1990-04-26 2004-11-09 Timespring Software Corporation Apparatus and method for reconstructing a file from a difference signature and an original file
US5131038A (en) * 1990-11-07 1992-07-14 Motorola, Inc. Portable authentification system
US5502766A (en) * 1992-04-17 1996-03-26 Secure Computing Corporation Data enclave and trusted path system
US5499297A (en) * 1992-04-17 1996-03-12 Secure Computing Corporation System and method for trusted path communications
US5276735A (en) * 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5596718A (en) * 1992-07-10 1997-01-21 Secure Computing Corporation Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor
US5422468A (en) * 1992-10-30 1995-06-06 Abecassis; Max Deposit authorization system
US5386103A (en) * 1993-07-06 1995-01-31 Neurnetics Ltd. Identification and verification system
US5444780A (en) * 1993-07-22 1995-08-22 International Business Machines Corporation Client/server based secure timekeeping system
US5371794A (en) * 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
USRE36946E (en) * 1993-11-02 2000-11-07 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
GB2287565B (en) * 1994-03-18 1997-11-05 Transmo Limited Improved card charging systems
GB2287565A (en) * 1994-03-18 1995-09-20 Transmo Limited Card charging system
US6212026B1 (en) 1994-09-16 2001-04-03 Kabushiki Kaisha Toshiba Data storage apparatus having an impact detecting mechanism
US5956194A (en) * 1994-09-16 1999-09-21 Kabushiki Kaisha Toshiba Data storage apparatus
US7130823B1 (en) 1995-09-14 2006-10-31 Citibank Aktiengesellschaft Computer system for data management and method for operation of the system
US7246097B2 (en) * 1996-08-23 2007-07-17 Orion Systems, Inc. Methods and apparatus for generating secure endorsed transactions
US6745936B1 (en) * 1996-08-23 2004-06-08 Orion Systems, Inc. Method and apparatus for generating secure endorsed transactions
US20050004876A1 (en) * 1996-08-23 2005-01-06 Orion Systems Inc. Methods and apparatus for generating secure endorsed transactions
US5835595A (en) * 1996-09-04 1998-11-10 At&T Corp Method and apparatus for crytographically protecting data
US8225089B2 (en) 1996-12-04 2012-07-17 Otomaku Properties Ltd., L.L.C. Electronic transaction systems utilizing a PEAD and a private key
US20020023215A1 (en) * 1996-12-04 2002-02-21 Wang Ynjiun P. Electronic transaction systems and methods therefor
US8016189B2 (en) 1996-12-04 2011-09-13 Otomaku Properties Ltd., L.L.C. Electronic transaction systems and methods therefor
US7635084B2 (en) 1996-12-04 2009-12-22 Esignx Corporation Electronic transaction systems and methods therefor
US20070089168A1 (en) * 1996-12-04 2007-04-19 Wang Ynjiun P Electronic transaction systems and methods therfeor
US7254561B1 (en) 1997-05-15 2007-08-07 Comex Electronics Ab Method and device for performing electronic transactions
US6213391B1 (en) * 1997-09-10 2001-04-10 William H. Lewis Portable system for personal identification based upon distinctive characteristics of the user
US20020123967A1 (en) * 1998-04-27 2002-09-05 Wang Ynjiun P. Methods of exchanging secure messages
US7107246B2 (en) * 1998-04-27 2006-09-12 Esignx Corporation Methods of exchanging secure messages
US6820202B1 (en) 1998-11-09 2004-11-16 First Data Corporation Account authority digital signature (AADS) system
US20020032860A1 (en) * 1998-11-09 2002-03-14 Wheeler Anne Mcafee Account authority digital signature
US7047416B2 (en) 1998-11-09 2006-05-16 First Data Corporation Account-based digital signature (ABDS) system
US20020112160A2 (en) * 1998-11-09 2002-08-15 First Data Dorporation Three Party Account Authority Digital Signature (AADS) System
US20020129248A1 (en) * 1998-11-09 2002-09-12 Wheeler Lynn Henry Account-based digital signature (ABDS) system
US8620814B2 (en) 1998-11-09 2013-12-31 First Data Corporation Three party account authority digital signature (AADS) system
US6820199B2 (en) 1998-11-09 2004-11-16 First Data Corporation Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
US6981154B2 (en) 1998-11-09 2005-12-27 First Data Corporation Account authority digital signature (AADS) accounts
US20050005123A1 (en) * 1998-11-09 2005-01-06 First Data Corporation Account authority digital signature (aads) system
US20050044373A1 (en) * 1998-11-09 2005-02-24 First Data Corporation Account authority digital signature (aads) system using encoded information
US7549050B2 (en) 1998-11-09 2009-06-16 First Data Corporation Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system
US20020026575A1 (en) * 1998-11-09 2002-02-28 Wheeler Lynn Henry Account-based digital signature (ABDS) system
US7519821B2 (en) 1998-11-09 2009-04-14 First Data Corporation Account authority digital signature (AADS) system
US7257228B2 (en) 1998-11-09 2007-08-14 First Data Corporation Account authority digital signature (AADS) system using encoded information
US20020116608A1 (en) * 1998-11-09 2002-08-22 Wheeler Henry Lynn Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
US6339766B1 (en) 1998-12-02 2002-01-15 Transactionsecure Electronic payment system employing limited-use account number
US20010047330A1 (en) * 1998-12-02 2001-11-29 Gephart Brian R. Electronic payment system employing selectively activatable limited-use account number
US6745940B1 (en) 1998-12-24 2004-06-08 Deutsche Telekom Ag Method for the secure handling of monetary or value units using prepaid data carriers
WO2000039758A1 (en) * 1998-12-24 2000-07-06 Deutsche Telekom Ag Method for the secure handling of money or units of value with pre-paid data carriers
US7062073B1 (en) 1999-01-19 2006-06-13 Tumey David M Animated toy utilizing artificial intelligence and facial image recognition
US6402038B1 (en) 1999-03-29 2002-06-11 Transmo Limited Card charging system
US6510998B1 (en) 1999-03-29 2003-01-28 Transmo Limited Card charging system
US6364208B1 (en) 1999-03-29 2002-04-02 Transmo Limited Card changing system
US6957336B2 (en) 2000-08-04 2005-10-18 First Data Corporation Establishing initial PuK-linked account database
US7028185B2 (en) 2000-08-04 2006-04-11 First Data Corporation Managing database for identifying to recipients security features of devices generating digital signatures
US7143284B2 (en) 2000-08-04 2006-11-28 First Data Corporation ABDS method and verification status for authenticating entity access
US6851054B2 (en) 2000-08-04 2005-02-01 First Data Corporation Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource
US6892302B2 (en) 2000-08-04 2005-05-10 First Data Corporation Incorporating security certificate during manufacture of device generating digital signatures
US7200749B2 (en) 2000-08-04 2007-04-03 First Data Corporation Method and system for using electronic communications for an electronic contract
US20040030901A1 (en) * 2000-08-04 2004-02-12 Lynn Henry Wheeler Linking public key of device to information during manufacture
US20040005051A1 (en) * 2000-08-04 2004-01-08 Wheeler Lynn Henry Entity authentication in eletronic communications by providing verification status of device
US6915430B2 (en) 2000-08-04 2005-07-05 First Data Corporation Reliably identifying information of device generating digital signatures
US7500272B2 (en) 2000-08-04 2009-03-03 First Data Corporation Manufacturing unique devices that generate digital signatures
US6938156B2 (en) 2000-08-04 2005-08-30 First Data Corporation ABDS system and verification status for authenticating entity access
US20090158029A1 (en) * 2000-08-04 2009-06-18 First Data Corporation Manufacturing unique devices that generate digital signatures
US7552333B2 (en) 2000-08-04 2009-06-23 First Data Corporation Trusted authentication digital signature (tads) system
US6950940B2 (en) 2000-08-04 2005-09-27 First Data Corporation ABDS method utilizing security information in authenticating entity access
US6952773B2 (en) 2000-08-04 2005-10-04 First Data Corporation Requesting execution of instructions on accounts in ABDS system
US7558965B2 (en) 2000-08-04 2009-07-07 First Data Corporation Entity authentication in electronic communications by providing verification status of device
US20030131234A1 (en) * 2000-08-04 2003-07-10 First Data Corporation Account-Based Digital Signature (ABDS) System for Authenticating Entity Access to Controlled Resource
US20030177361A1 (en) * 2000-08-04 2003-09-18 Wheeler Lynn Henry Method and system for using electronic communications for an electronic contract
US20030126437A1 (en) * 2000-08-04 2003-07-03 First Data Corporation ABDS Method and Verification Status for Authenticating Entity Access
US7096354B2 (en) 2000-08-04 2006-08-22 First Data Corporation Central key authority database in an ABDS system
US20030126438A1 (en) * 2000-08-04 2003-07-03 First Data Corporation ABDS System and Verification Status for Authenticating Entity Access
US6959381B2 (en) 2000-08-04 2005-10-25 First Data Corporation Central key authority (CKA) database for user accounts in ABDS system
US6978369B2 (en) 2000-08-04 2005-12-20 First Data Corporation Person-centric account-based digital signature system
US7082533B2 (en) 2000-08-04 2006-07-25 First Data Corporation Gauging risk in electronic communications regarding accounts in ABDS system
US20020016913A1 (en) * 2000-08-04 2002-02-07 Wheeler Lynn Henry Modifying message data and generating random number digital signature within computer chip
US20030126439A1 (en) * 2000-08-04 2003-07-03 First Data Corporation ABDS System Utilizing Security Information in Authenticating Entity Access
US20030115151A1 (en) * 2000-08-04 2003-06-19 Wheeler Lynn Henry Person-centric account-based digital signature system
US20030115463A1 (en) * 2000-08-04 2003-06-19 First Data Corporation Requesting Execution of Instructions on Accounts in ABDS System
US20030101344A1 (en) * 2000-08-04 2003-05-29 First Data Corporation Establishing Initial PuK-Linked Account Database
US20030101136A1 (en) * 2000-08-04 2003-05-29 First Data Corporation Managing Account Database in ABDS System
US20030097561A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System
US20030097573A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Central Key Authority Database in an ABDS System
US20030097562A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Managing Database for Reliably Identifying Information of Device Generating Digital Signatures
US20030097570A1 (en) * 2000-08-04 2003-05-22 First Data Corporation Managing Database for Identifying to Recipients Security Features of Devices Generating Digital Signatures
US6983368B2 (en) 2000-08-04 2006-01-03 First Data Corporation Linking public key of device to information during manufacture
US20030014372A1 (en) * 2000-08-04 2003-01-16 Wheeler Lynn Henry Trusted authentication digital signature (tads) system
US7010691B2 (en) 2000-08-04 2006-03-07 First Data Corporation ABDS system utilizing security information in authenticating entity access
US20020023217A1 (en) * 2000-08-04 2002-02-21 Wheeler Lynn Henry Manufacturing unique devices that generate digital signatures
US6789189B2 (en) 2000-08-04 2004-09-07 First Data Corporation Managing account database in ABDS system
US7047414B2 (en) 2000-08-04 2006-05-16 First Data Corporation Managing database for reliably identifying information of device generating digital signatures
US20030131235A1 (en) * 2000-08-04 2003-07-10 First Data Corporation ABDS Method Utilizing Security Information in Authenticating Entity Access
US7784106B2 (en) 2000-08-04 2010-08-24 First Data Corporation Manufacturing unique devices that generate digital signatures
US20040128508A1 (en) * 2001-08-06 2004-07-01 Wheeler Lynn Henry Method and apparatus for access authentication entity
US7593527B2 (en) 2005-01-07 2009-09-22 First Data Corporation Providing digital signature and public key based on shared knowledge
US20060153371A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Generating digital signatures using ephemeral cryptographic key
US20060156013A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Digital signature software using ephemeral private key and system
US7869593B2 (en) 2005-01-07 2011-01-11 First Data Corporation Software for providing based on shared knowledge public keys having same private key
US7490239B2 (en) 2005-01-07 2009-02-10 First Data Corporation Facilitating digital signature based on ephemeral private key
US20060153366A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Verifying digital signature based on shared knowledge
US20060156012A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Facilitating digital signature based on ephemeral private key
US20060153368A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Software for providing based on shared knowledge public keys having same private key
US20060153364A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Asymmetric key cryptosystem based on shared knowledge
US20060153367A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Digital signature system based on shared knowledge
US7936869B2 (en) 2005-01-07 2011-05-03 First Data Corporation Verifying digital signature based on shared knowledge
US20060153365A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Providing digital signature and public key based on shared knowledge
US7693277B2 (en) 2005-01-07 2010-04-06 First Data Corporation Generating digital signatures using ephemeral cryptographic key
US20060153369A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Providing cryptographic key based on user input data
US20060153370A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Generating public-private key pair based on user input data
US8301888B2 (en) * 2006-03-27 2012-10-30 Kyocera Corporation System and method for generating secured authentication image files for use in device authentication
US7971058B2 (en) 2006-03-27 2011-06-28 Kyocera Corporation System and method for generating a plaintext / cyphertext database for use in device authentication
US20100241853A1 (en) * 2006-03-27 2010-09-23 Taylor John P System and method for generating a plaintext / cyphertext database for use in device authentication
US20070226497A1 (en) * 2006-03-27 2007-09-27 Taylor John P Communication protocol for device authentication
US20100268946A1 (en) * 2006-03-27 2010-10-21 Taylor John P System and method for generating secured authentication image files for use in device authentication
US8296565B2 (en) * 2006-03-27 2012-10-23 Kyocera Corporation Communication protocol for device authentication
US7949869B2 (en) 2006-07-19 2011-05-24 Rel-Id Technologies, Inc. Establishing relative identity
US7949867B2 (en) 2006-07-19 2011-05-24 Rel-Id Technologies, Inc. Secure communications
US20100119063A1 (en) * 2006-07-19 2010-05-13 Sanjay Deshpande Establishing Relative Identity
US20080022091A1 (en) * 2006-07-19 2008-01-24 Sanjay Deshpande Secure Communications
US10079811B2 (en) 2011-09-07 2018-09-18 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US9515989B1 (en) * 2012-02-24 2016-12-06 EMC IP Holding Company LLC Methods and apparatus for silent alarm channels using one-time passcode authentication tokens
US9781389B2 (en) 2012-07-12 2017-10-03 Elwha Llc Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box
US20140016777A1 (en) * 2012-07-12 2014-01-16 Elwha Llc Pre-Event Repository Associated with Individual Privacy and Public Safety Protection Via Double Encrypted Lock Box
US10348494B2 (en) 2012-07-12 2019-07-09 Elwha Llc Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box
US9825760B2 (en) 2012-07-12 2017-11-21 Elwha, Llc Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box
US10277867B2 (en) * 2012-07-12 2019-04-30 Elwha Llc Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box
US10069958B1 (en) 2017-07-20 2018-09-04 Bank Of America Corporation Dynamic mobile authorization advancement system

Similar Documents

Publication Publication Date Title
US4825050A (en) Security transaction system for financial data
AU651326B2 (en) Method and system for personal identification using proofs of legitimacy
Simmons A survey of information authentication
US6061791A (en) Initial secret key establishment including facilities for verification of identity
CA1311559C (en) Method and system for personal identification
US4453074A (en) Protection system for intelligent cards
US6119227A (en) Methods and apparatus for authenticating an originator of a message
US9640012B2 (en) Transaction verification protocol for smart cards
US7379919B2 (en) Method and system for conducting secure payments over a computer network
US20020016913A1 (en) Modifying message data and generating random number digital signature within computer chip
US20070168291A1 (en) Electronic negotiable documents
EP0172670A2 (en) An apparatus for effecting and recording monetary transactions
EP0668580A1 (en) Method of authenticating a terminal in a transaction execution system
JP3158118B2 (en) Authentication information verification system
EP1272988B1 (en) An improved method and system for conducting secure payments over a computer network
US6636969B1 (en) Digital signatures having revokable anonymity and improved traceability
EP0808535B1 (en) Electronic negotiable documents
JP2574755B2 (en) Personal authentication system
AU2012201255B2 (en) An improved method and system for conducting secure payments over a computer network
AU2007216920B2 (en) An improved method and system for conducting secure payments over a computer network
AU3010700A (en) Electronic negotiable documents
EP1921579A2 (en) An improved method and system for conducting secure payments over a computer network
Rihaczek TeleTrusT-OSIS and communication security
IL168007A (en) Method and devices for performing security control in electronic message exchanges
JPH11338945A (en) Electronic coin issue method

Legal Events

Date Code Title Description
AS Assignment

Owner name: TRANSACTION SECURITY CORPORATION, PLANTATION, FLA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:GRIFFITH, JOHN B.;LINTON, DONALD F.;REEL/FRAME:004201/0131

Effective date: 19831209

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
FP Lapsed due to failure to pay maintenance fee

Effective date: 19930425

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362